Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

redhat логотип

CVE-2026-3312

Опубликовано: 13 мар. 2026
Источник: redhat
CVSS3: 7.7

Описание

A flaw was found in Pagure's rendering engine for reStructuredText (RST) files. An authenticated user can exploit an unrestricted .. include:: directive within RST files to read arbitrary internal files from the server hosting Pagure. This information disclosure vulnerability allows unauthorized access to sensitive data on the server.

Отчет

This vulnerability in Pagure's reStructuredText (RST) rendering engine allows an authenticated user to read arbitrary internal files from the server. This is due to the .. include:: directive in the docutils library not being restricted or jailed during the rendering process within Pagure. Exploitation requires an authenticated user to craft a malicious RST file.

Меры по смягчению последствий

To mitigate this vulnerability, restrict authenticated access to the Pagure instance to only trusted and authorized users. This operational control limits the attack surface by ensuring that only privileged individuals can interact with the vulnerable reStructuredText rendering engine. Implement strong authentication and authorization policies for Pagure users to minimize unauthorized access.

Дополнительная информация

Статус:

Moderate
Дефект:
CWE-22
https://bugzilla.redhat.com/show_bug.cgi?id=2443259pagure: Pagure: Information disclosure via unrestricted reStructuredText include directive

7.7 High

CVSS3

Связанные уязвимости

ubuntu
9 дней назад

[Unknown description]

debian

Описание отсутствует

7.7 High

CVSS3